π
π½ analyzes your github actions
β98Apr 28, 2026Updated this week
Alternatives and similar repositories for claws
Users that are interested in claws are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A tool for interacting with live processes/containersβ22Sep 21, 2022Updated 3 years ago
- egrets monitors egressβ46Apr 12, 2020Updated 6 years ago
- A framework for understanding the capabilities of automated detection methods at identifying classes of application security vulnerabilitβ¦β33Updated this week
- The EPSS Calculator is a user-friendly web application that calculates the EPSS (Exploit Prediction Scoring System) score based on a provβ¦β17Nov 11, 2024Updated last year
- β39Jul 31, 2025Updated 9 months ago
- End-to-end encrypted email - Proton Mail β’ AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- A tool for folks who `git clone` first and ask questions laterβ68Apr 15, 2026Updated 2 weeks ago
- β87Mar 30, 2026Updated last month
- A public collection of detections designed to detect threats associated with the Okta WIC Platform.β23Mar 26, 2026Updated last month
- Create tar/zip archives that try to exploit zipslip vulnerability.β48Sep 20, 2024Updated last year
- GitHub Actions Cache Native Malware - for Educational and Research Purposes only.β145Jan 28, 2026Updated 3 months ago
- A menagerie of insecure and exploitable GitHub Actions workflows and action definitionsβ19Apr 19, 2026Updated last week
- β15Mar 12, 2025Updated last year
- A C and Go /proc/pid/maps cloak of invisibilty for shared object filesβ21Nov 19, 2025Updated 5 months ago
- Crashbench is a LLM benchmark to measure bug-finding and reporting capabilities of LLMsβ14Mar 8, 2026Updated last month
- Bare Metal GPUs on DigitalOcean Gradient AI β’ AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- AutoPwnKey is a red teaming framework and testing tool using AutoHotKey (AHK), which at the time of creation proves to be quite evasive. β¦β112Jul 21, 2025Updated 9 months ago
- Repository containing source code of MixewayFlow service that is Swiss army knife for DevSecOps Teamsβ80Apr 24, 2026Updated last week
- AI-driven vulnerability discovery and live validationβ111Apr 17, 2026Updated 2 weeks ago
- Octoscan is a static vulnerability scanner for GitHub action workflows.β257Mar 30, 2026Updated last month
- β14Jan 8, 2026Updated 3 months ago
- β52Dec 20, 2025Updated 4 months ago
- Detect public repository dependencies in the GitHub repositories with an orphan required library.β24Jun 24, 2025Updated 10 months ago
- β65May 21, 2024Updated last year
- A flexible framework for security teams to build and deploy AI-powered workflows that complement their existing security operations.β156Feb 9, 2026Updated 2 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer β’ AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Easily run Conftest, pull remote policies, surface the results, and obtain test metricsβ12Oct 2, 2025Updated 6 months ago
- A comprehensive checklist and guide for organizations looking to implement a robust cybersecurity programβ47Feb 2, 2026Updated 2 months ago
- Toolset to examine iDevices for Security / Safety Threatsβ23Jan 31, 2026Updated 3 months ago
- Examine Chrome extensions for security issuesβ96Nov 16, 2025Updated 5 months ago
- GCP CSPM using Google Sheetsβ38Apr 4, 2025Updated last year
- Finding Valuable Needles in Global Source Code Haystacks with Automationβ17Feb 11, 2021Updated 5 years ago
- Elastic Security Labs' malware analysis and reverse engineering libraryβ54Mar 10, 2026Updated last month
- prel(iminary) is an application that temporarily assigns Google Cloud IAM Roles and includes an approval process.β46Updated this week
- A tool for running concurrent multi-configuration experiments.β12Jul 10, 2017Updated 8 years ago
- Proton VPN Special Offer - Get 70% off β’ AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Unauthenticated enumeration of AWS IAM Roles.β26Apr 18, 2026Updated last week
- β16Sep 20, 2023Updated 2 years ago
- β18Dec 15, 2020Updated 5 years ago
- Feed it a number. Your cloned voice does the social engineering, while you sip your coffee. A ghost that talks on the phone for you.β111May 30, 2025Updated 11 months ago
- Nakamoto is a 2 layer encryption tool to protect your data and your cyptocurrencyβ16Apr 8, 2026Updated 3 weeks ago
- β18Feb 2, 2026Updated 2 months ago
- The security workflow engine!β138Nov 20, 2025Updated 5 months ago